default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 7
Volume 7, Number 1, January 2016
- Raniyah Wazirali, Zenon Chaczko:
Hyper Edge Detection with Clustering for Data Hiding. 1-10 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics. 11-20 - Pei-Wei Tsai, Shunmiao Zhang, Jing Zhang, Yuan Liu, Yao He, Jeng-Shyang Pan:
Undulating Swarm Intelligence Agents in Wave Increasing Evolved Bat Algorithm. 21-30 - Kenji Ozawa, Mayuko Mitsuki:
Effects of the Relation between Reproduced Sound Pressure Levels and Viewing Angles on the Sense of Presence in Audio-visual Content. 31-40 - Weixin Kang, Raja Asif Wagan, Jingde Li, Chengcheng Zhang:
Threshold Based Chain-Leader Election Scheme for Mobile Sink improved energy-efficient PEGASIS-based Routing Protocol. 41-49 - Baishan Zhao, Chengyu Qi:
Chaotic Signal Generator Design Based on Discrete System. 50-58 - Hongfeng Zhu, Dan Zhu, Yan Zhang:
A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model. 59-71 - Zhifang Wang, Meng Chen, Xiao Meng, Linlin Tang:
Bimodal Multi-feature Fusion based on Quaternion Fisher Discriminant Analysis. 72-79 - Bao-Rong Chang, Hsiu Fen Tsai, Hung-Ta Hsu:
Secondary Index to Big Data NoSQL Database ¡V Incorporating Solr to HBase Approach. 80-89 - Yapeng Li, Zhi Chai, Xiaodan Xie, Weishan Zhang, Zhenghao Li:
A Seat Position Labeling Algorithm Based on Improved Edge Operator and Gray Projection. 90-100 - Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Wu-Chih Hu, Yu-Lin Lin:
A Vehicle Flow Counting System in Rainy Environment Based on Vehicle Feature Analysis. 101-114 - Jinshui Wang, Xingsi Xue, Shu-Chuan Chu:
Towards Supporting Feature Location Using Syntactic Analysis. 115-126 - Gaoling Li, Yingli Wang, Hongbin Ma:
Audio Packet Encryption of Flow Control Base on stop-and-wait Protocol. 127-134 - Chien-Chang Chen, Yao-Hong Tsai:
An Expandable Essential Secret Image Sharing Structure. 135-144 - Yan-Jiao Wang, Xiao-Jie Li:
Targets Coverage Algorithm based on Three-dimensional Directional Sensing Model. 145-152 - Sijing Cai, Pei-Wei Tsai:
Echolocation Guided Evolved Bat Algorithm. 153-162 - Bing Zhao, Qun Ding, Lina Ding:
Performance Research of Multiband Parallel Transmission Cognitive Ultra Wideband System. 163-174 - Peng Geng, Song Tian, Kai Lu:
Multifocus Image Fusion by the Sum of Local Variance Energy. 175-183 - Chih-Chao Chung, Li-Chung Chao, Shi-Jer Lou:
Constructing the predictive model for strategy execution problems -the application of the two-stage Analytic Network Process. 184-197 - Wan-Li Lyu, Chin-Chen Chang:
An Image Compression Method Based on Block Truncation Coding and Linear Regression. 198-215 - Da-Jie Guo, Zhe-Ming Lu, Hao Luo:
Multi-Channel Adaptive Mixture Background Model for Real-time Tracking. 216-221
Volume 7, Number 2, March 2016
- Hongfeng Zhu, Tianhua Liu, Yu Xia:
A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server. 222-232 - Dora M. Ballesteros L., Diego Renza, Steven Camacho:
An Unconditionally Secure Speech Scrambling Scheme Based on An Imitation Process to A Gaussian Noise Signal. 233-242 - Xiangdong Yin, Linping Tang, Na Wang:
Extremely Randomized Clustering Forest Based Scene Recognition Algorithm in Mobile Devices. 243-253 - Yong Jin, Ruigang Li:
Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks. 254-265 - Yu-Jia Ma, Yuesheng Zhu, Xiyao Liu:
A Novel Reversible Watermarking Scheme for Relational Databases Protection Based on Histogram Shifting. 266-276 - Tingting Xie, Jishi Zheng, Shu-Chuan Chu:
A Joint Attitude Control Method for Small Unmanned Aerial Vehicles Based on Prediction Incremental Backstepping. 277-285 - Yibing Wang:
The Encryption Scheme for DICOM Based on the Homomorphic Higher Degree Residue System in Cloud Storage. 286-295 - Xiaodan Xie, Bo-Hu Li, Xudong Chai:
A Unified Framework of Multiple Kernels Learning for Hyperspectral Remote Sensing Big Data. 296-303 - Wangshu Li, Ziheng Yang, Qun Ding:
Synchronous Digital Signal Communication System Based on Chaotic Masking. 304-316 - Li Jiang, Xingsi Xue, Pei-Wei Tsai, Jeng-Shyang Pan:
A Novel Ontology Matching Technology Based on NSGA-II. 317-324 - Rong Gao, Yi-Xiong Yang:
Consumers' Decision: Fashion Omni-channel Retailing. 325-342 - Yan Xu, Hong Zhong, Jie Cui:
An Improved Identity-Based Multi-Proxy Multi-Signature Scheme. 343-351 - Dilmurat Tursun, Li Kai, Gulxax Halelbek, Askar Hamdulla:
A Joint Approach of Harris Corners Detection and Baseline Searching for Localization of Uyghur Text Lines in Image Sequences. 352-361 - Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. 362-375 - Yang Sun, Hongfeng Zhu, Xueshuai Feng:
An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps. 376-385 - Chuan Qin, Haoran Ren, Chin-Chen Chang, Qingkui Chen:
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis. 386-398 - Yi Fan, Yue-Sheng Zhu, Zhen Liu:
An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis. 399-408 - Bing Zhao, Zhifang Wang, Qun Ding, Linlin Tang:
Optimizing Multiband Orthogonal Transmission of Low-Energy and Efficient Cognitive Ultra Wideband System. 409-418 - Shun-Peng Hsu, Yi-Nung Chung, Young-Chi Hsu, Chao-Hsing Hsu:
Applying Power Management and Wireless Sensing System to Plant Factory. 419-424 - Zuoxian Nie, Mao-Hsiung Hung, Jing Huang:
A Novel Algorithm of Rebar Counting on Conveyor Belt Based on Machine Vision. 425-437 - Rui Xu:
A Multistage Method for Road Extraction from Optical Remotely Sensed Imagery. 438-447 - Jingli Yang, Fudan Li, Zhen Sun, Shouda Jiang:
A Small Target Detection Method based on Human Visual System and Confidence Measurement. 448-459
Volume 7, Number 3, May 2016
- Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model. 460-474 - Hongfeng Zhu, Dan Zhu, Yifeng Zhang, Yan Zhang:
A Novel On-Demand Password Scheme Based on BAN Logic. 475-488 - Hejin Yuan, Chunhong Duo, Wei-hua Niu:
A Human Behavior Recognition Method Based on Latent Semantic Analysis. 489-498 - Lian-Lei Lin, Yang Wu, Gang Wang:
A Simulation Method of Atmospheric Turbulence Based on Von Karman Model. 499-509 - Jiaqi Zhen, Zhifang Wang, Bing Zhao, Linlin Tang:
A Novel Super-Resolution Direction Finding Method for Wideband Signals Based on Multiple Small Aperture Subarrays. 510-520 - Lin Liu, Fumin Zou:
Research on the Data Collection Methods for Pavement Maintenance Based on the Internet of Vehicles. 521-529 - Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng:
Double Reversible Watermarking Algorithm for Image Tamper Detection. 530-542 - Chen Cui, Shen Wang, Xiamu Niu:
A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape. 543-557 - Xin-Ling Guo, Zhe-Ming Lu:
Urban Road Network and Taxi Network Modeling Based on Complex Network Theory. 558-568 - Xiao Chen, Zhe-Ming Lu:
Protection on Complex Networks with Geometric and Scale-Free Properties. 569-575 - Qi Zhang, Yuchao Guo, Wangshu Li, Qun Ding:
Image Encryption Method Based on Discrete Lorenz Chaotic Sequences. 576-586 - Mingqian Wang, Xianfeng Liu, Wei-jie Gu:
A DWT-Based Covert Timing Channel of High Concealment. 587-598 - Feng-Cheng Chang, Hsiang-Cheh Huang:
Reversible Data Hiding with Difference Prediction and Content Characteristics. 599-609 - Lifei Zhan, Yuesheng Zhu, Zhiwei Mo:
An Image Splicing Detection Method Based on PCA Minimum Eigenvalues. 610-619 - Qingzhu Wang, Wanjun Kang:
Lossy Compression for Compressive Sensing of Three-Dimensional Images. 620-628 - Nong Si, Ke-Bin Jia:
One Communication Key Udate with Whitelist Attribute in SCADA System. 629-636 - Nan Jia, Songyan Liu, Qun Ding, Shangru Wu, Xuming Pan:
A New Method of Encryption Algorithm Based on Chaos and ECC. 637-644 - Jia Zhao, Li Lv, Hui Wang, Dekun Tan, Jun Ye, Hui Sun, Yin-Tai Hu:
Artifcial Bee Colony Based on Special Central and Adapt Number of Dimensions Learning. 645-652 - Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang:
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems. 653-658 - Meiling Li, Anhong Wang, Gang-Fei Wang:
An Analysis Model for OFDMA-Based Inter-cell Interference. 659-673
Volume 7, Number 4, July 2016
- Chong-Ming Zhao, Zhenfeng Zhu, Yao Zhao:
Text Detection Based On Discriminative Dictionary Learning. 674-684 - Yohan Suryanto, Suryadi, Kalamullah Ramli:
A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding. 697-713 - Liquan Chen, Zijuan Fan, Miao Lu, Aiqun Hu:
Information Hiding Capacities in Different Multiple Antennas Systems. 714-728 - Dingxin Song, Degen Huang, Lishuang Li, Hong-Lei He:
Biomedical Named Entity Recognition Based on Feature Selection and Word Representations. 729-740 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing. 741-753 - Li Li, Dejie Zheng, Jianfeng Lu, Xiaoyang Mao, Chin-Chen Chang:
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images. 754-770 - Miaomiao Liu, Jingfeng Guo, Xu Luo:
Link Prediction Based on the Similarity of Transmission Nodes of Multiple Paths in Weighted Social Networks. 771-780 - Shuyi Lin, Xiaosheng Huang:
Full Simulation of AC Contactor in the Dynamic Process Based on Finite Element Method. 781-790 - Jeng-Shyang Pan, Chen Wang, Tien-Wen Sung:
Road Network Modeling with Layered Abstraction for Path Discovery in Vehicle Navigation Systems. 791-801 - Chun-Ming Wu, Qiang-Huan Song, Long-Long Jiao:
Collaborative Image Compression Algorithm In Wireless Multimedia Sensor Networks. 802-809 - Xiaodan Xie, Bohu Li, Xudong Chai:
Quasiconformal-Matrix-Based Multikernels Learning for Sensory Data Classification. 810-817 - Rongjin Zheng, Xiaosheng Huang, Huiqiong Deng:
Design of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules. 818-825 - Juan Wang, Qun Ding:
Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication. 826-835 - Binbin Xia, Anhong Wang, Chin-Chen Chang, Li Liu:
An Image Steganography Scheme Using 3D-Sudoku. 836-845 - Xiaorong Cheng, Tianqi Li, Sizu Hou, Huilan Zhao, Hongyu Wang:
Research on Credibility Measurement Method of Data In Big Data. 846-857 - Ye Yuan, Kebin Jia:
A Semi-supervised Approach for Water Quality Detection based on IoT Network. 858-866 - Jeng-Shyang Pan, Hongfeng Zhu:
An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices. 867-880 - Ying Zhou, Yongsheng Liang, Wei Liu, Cheng He, Yue Zhu:
Saliency Region and Motion Characteristics Combined Video Quality Assessment. 881-888 - Diego A. Rojas, Olga L. Ramos, Jorge E. Saby:
Recognition of Spanish Vowels through Imagined Speech by using Spectral Analysis and SVM. 889-897 - Chun-Ming Wu, Qiang-Huan Song:
Fault Diagnosis of Wind Turbine Vibration Based on Wavelet Transform And Neural Network. 898-905
Volume 7, Number 5, September 2016
- Pengyu Liu, Yueying Wu, Yuan Gao, Kebin Jia:
Hierarchical Coding Algorithm for Medical Video Based on H.265/HEVC. 906-915 - Rong-San Lin:
A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal. 916-929 - Chun-Ming Wu, Tao Yang:
A New Refinement Method for Mirror Error in WSN Localization. 930-937 - Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding:
Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks. 938-948 - Qingzhou Ye, Maolin Zhang, Ming-Yong Lin:
Design of a High Sensitivity and Non-contact Planar Capacitance Sensor. 949-959 - Wei-Liang Tai, Ya-Fen Chang, Yung-Chi Chen:
A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks. 960-969 - Zhihong Li, Qiang Jin, Chin-Chen Chang, Anhong Wang, Li Liu:
A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization. 970-982 - Qingzhu Wang, Wanjun Kang:
Truncation Strategy of Tensor Compressive Sensing for Noisy Video Sequences. 983-992 - Bao-Rong Chang, Hsiu Fen Tsai, Cin-Long Guo:
High Performance Remote Cloud Datacenter Backup in Big Data Environment. 993-1005 - Yang Sun:
An Improved Password Authentication Scheme for Telecare Medical Information Systems Based on Chaotic Maps with Privacy Protection. 1006-1019 - Shan-Qing Zhang, Wen-Lei Wang, Jianfeng Lu, Qili Zhou, Li-Li:
Image Segmentation Using A New Scalar Texture Descriptor based on Extended Structure Tensor. 1020-1030 - Qiu-Yu Zhang, Shuang Yu, Ning Chen, Wen-Jin Hu, Si-Bin Qiao:
An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream. 1031-1040 - Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. 1041-1051 - Jeng-Shyang Pan, Lijun Yan, Shu-Chuan Chu, John F. Roddick:
Contourlet and Nearest Feature Line Based Feature Extraction Approach for One Prototype Sample Problem. 1052-1059 - Yanfei Jia, Shanshan Liu, Xiaodong Yang:
A New Undetermined Blind Source Separation Method based on Orthogonal Projection. 1060-1068 - Rui Xu:
A Novel Method for Road Centerline Extraction from High Spatial Resolution Satellite Images. 1069-1080 - Yonghong Tan, Xuhui Wang, Xiangdong Yin:
Optimal Beamforming Design for Secure Transmission with Channel Covariance Uncertainty. 1081-1091 - Lijian Zhou, Hui Wang, Zhe-Ming Lu, Tingyuan Nie, Kun Zhao:
Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method. - Shuqiang Guo, Liqun Wang, Honghui Fan:
An Image Segmentation Method for Eliminating Illumination Influence. 1100-1109 - Jilin Zhang, Yongzeng Lai, Pei-Wei Tsai:
Analysis of Volatilities and Correlations for Chinese Stock Markets. 1110-1125 - Qiu-Yu Zhang, Shuang Yu, Wen-Jin Hu, Si-Bin Qiao, Tao Zhang:
An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System. 1126-1135 - Jianfeng Lu, Xiaoyan Xu, Li Li, Chin-Chen Chang, Qiang Wang:
A Robust Image Copy Detection Method Based On Feature Extraction Algorithm. 1136-1146
Volume 7, Number 6, November 2016
- P. Senatore, Alessandro Piva, Fabio Garzia, Roberto Cusani:
A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform. 1147-1167 - Qian Mao, K. Bharanitharan, Chin-Chen Chang:
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. 1168-1184 - Zhao Kai, Tang Xian:
Virtual Host Dynamic Cooperative Transfer Mechanism Based on Service Driven and Content Aware for Cloud Computing. 1185-1193 - Dao-cheng Qu, Jeng-Shyang Pan, Shaowei Weng, Shaoqiu Xu:
A Novel Reversible Data Hiding Method for Color Images Based on Dynamic Payload Partition and Cross-Channel Correlation. 1194-1205 - Jia Zhao, Xuefeng Fu, Li Lv, Runxiu Wu, Hui Wang, Xiang Yu, Tanghuai Fan:
Opposition-Based Artificial Bee Colony Using Different Learning Models. 1206-1214 - Shoulin Yin, Jie Liu:
A K-means Approach for Map-Reduce Model and Social Network Privacy Protection. 1215-1221 - Jiangtao Zhai, Fang Yang, Yuewei Dai, Mingqian Wang:
A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence. 1222-1230 - Lin You, Jiawan Wang, Bin Yan:
A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping. 1231-1242 - Zhe-Ming Lu, Ya-Pei Feng:
Information Entropy and Cross Information Entropy Based Attacking Methods for Complex Networks. 1243-1253 - Truong-Giang Ngo, Trong-The Nguyen, Ngo Quoc Tao, Duc-Dung Nguyen, Shu-Chuan Chu:
Similarity Shape Based on Skeleton Graph Matching. 1254-1264 - Qingzhu Wang, Wanjun Kang, Yan-Jiao Wang:
Support Tensor Machine Image Classification Algorithm Based on Tensor Principal Component Analysis. 1265-1273 - Shoulin Yin, Hang Li, Jie Liu:
A New Provable Secure Certificateless Aggregate Signcryption Scheme. 1274-1281 - Xiao-Long Liu, Chia-Chen Lin, Chin-Chen Chang, Shyan-Ming Yuan:
A Survey of Fragile Watermarking-based Image Authentication Techniques. 1282-1292 - Nai-Chung Yang, Chang-Ming Kuo, Chung-Ming Kuo, Liang-Kang Huang:
Image Retrieval Using Macro- and Micro-Based Visual Vocabulary. 1293-1305 - Lu Tang, Leida Li, Jiansheng Qian, Jianying Zhang, Jeng-Shyang Pan:
NSCT-Based Multimodal Medical Image Fusion With Sparse Representation and Pulse Coupled Neural Network. 1306-1316 - Lian-Lei Lin, Daming Pei, Xiaobin Zhao, Yan-xi Jia:
Modeling of Laser Transmission in The Atmosphere For Virtual Test. 1317-1329 - Jianneng Chen, Qunshan Chen, Fumin Zou:
Certificate-Based Aggregate Signature Scheme without Bilinear Pairings. 1330-1336 - Jeng-Shyang Pan, Lijun Yan, Xingming Liu, Keke Wu:
Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification. 1337-1344 - Xiuyuan Chen, Xiyuan Peng, Yu Peng, Jun-Bao Li:
The Classification of Synthetic Aperture Radar Image Target Based on Deep Learning. 1345-1353 - Jing Zhang, Min Chen, Pei-Wei Tsai, Longmei Tang, Xiaorong Ji:
A Coverage Loopholes Recovery Algorithm in Wireless Sensor Networks. 1354-1364 - Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu, Shuai Liu:
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps. 1365-1372 - Zongliang Gan, Changhong Chen, Ziguan Cui, Feng Liu:
Novel Frame Rate Up-Conversion Method Through Weight Matching Criterion and Motion Vector Refinement. 1373-1383 - Chin-Chen Chang, Wan-Ting Tseng, Hao-Chuan Tsai:
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks. 1384-1394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.